I want to start learning about databases from a penetration tester's perspective and I would like to know what things will be useful on the long run.
Also do you know any good books to kickstart my ...

Is there any list of specific courses that the NSA suggests to be taken at the schools that they have designated CAE/IAE? I have a general knowledge of what courses I should take, but I still want to ...

I think the title pretty says it all.
Do you think that if one has experience in implementations of security and network solutions, and then gets to become a PMP, will that be an added value to his ...

I would like to know which degree out of these two would better prepare me for Information Systems Security. I want to eventually work with the CIA as a Information Systems security specialist however ...

Recently I came across a site called SecurityTube.net, which has a ton of amazing security stuff. I'm following their Python Scripting Expert videos which are totally worth it. I also came across the ...

I'm a Security Student at Pennsylvania State University and I am considering taking FOR408 through SANS this summer in Pittsburgh (not far from my home). I really want this to help me stand out in my ...

I know that there are several hacking competitions, but I would like to know how to prepare for hacking competitions.
I know that there are several hacking courses, online and offline, but they only ...

Hello my team is tasked to perform security focused training for developers (.NET and JAVA). I have used WebGoat to demonstrate OWASP Top 10 type security vulnerabilities and am looking for a similar ...

I'm looking for a class project that (1) is scalable to large classes, and (2) teaches secure design. This is for an undergraduate course on computer security. Hopefully, it would be educational and ...

If i were to take the course http://www.sans.org/course/advanced-web-app-penetration-testing-ethical-hacking# as a self study course over 4 months, how is it eventually graded? Is it an exam at the ...

I'm about to receive an offer for a position of "Security developer / Pen-tester" that I have been interviewing for. The firm is moderately sized and as some very big clients, so in terms of cost vs. ...

I'm looking for a demonstration web site that shows an example of a web site that is vulnerable to command injection: where I can inject something and get the web site to run a shell command. (This ...

I am looking for a resource that helps learn malware analysis. I know about the practical malware analysis book but i am looking for something other than a book. For example a Site or video tutorials.
...

I am currently a Masters student looking to change career from sales to IT, specifically Information Security. What are some good resources about finding jobs? What skills should I focus on to get a ...

I was recently asked by a friend of mine (outside the computer science field) if he can be successful in web-application pen-testing
I took this as an excuse to ask a more comprehensive question.
I ...

So, as it stands I'm a 21 year old recent Bio-Chemistry graduate looking for a path into InfoSec.
Without a background in any computing discipline I assumed that it would be seen as compulsory that I ...

I'm graduating with my bachelor's in computer science in December, and I'm looking to get an internship in a security consultant firm for the summer, or apply as an analyst/associate in October. I've ...

What are the requirements for studying CEH?
Is there any requirements for the programming background?
And can anyone apply for it or does he has to have a recommendation for both studying and taking ...

I am a CS student, and am considering competing in the National Collegiate Cyber Defense Competition. Although I have a fair amount of experience in programming competitions (e.g. ACM at High School ...

I'm 20 years old and have no knowledge in the world of information security! I'm currently studying engineering and I've recently found what work I want to do (pentesting or a career in fields like ...

My university's cybersecurity program allows one to take a course in ordinary differential equations as an elective. The course would be interesting to take, although I don't know how I'd apply it to ...

My qualification is Masters in Computer Science and i am currently working as a Technical Support Associate (Network Support) with a MNC. I am good with JAVA programing and have worked on some small ...

I've read the 'Shellcoder's Handbook' as well as 'The Art of Exploitation', and appreciated both a lot. Now I'm looking for additional resources delving into vulnerability spotting, code auditing, and ...

I am somewhat confused in terms of how secure Android OS is and how updates work on Android. Are there security fixes on each release? How can I keep track for Android exploits and what are the most ...

I am currently a programmer with 4 years of experience. In the past I have done tech support for a few years and was an instructor at an IT trade school for a few years. I have a good balance of IT ...

Does anyone have any solid recommendations for deploying and maintaining security awareness training? I am not looking for a specific vendor but I am trying to gain insight about how the material is ...

I am trying to find an updated book (preferably from 2012-2013) that can cover linux security aspects comprehensively. I searched on Amazon and found that most Linux security books are from back in ...

I'm a little late, I'm 21 always been interested in IT and this past year I've looked here and there for computer security, but I don't have a diploma.
I never had any idea on what to do in my life ...